Oct. 13, 2023, 6 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

This is the third video in the Foundations of Exploitation series and in this video, we'll explore stack cookies. Stack cookies are interesting as they are an early attempt to implement anti-exploitation protections through the compiler - helping to mitigate programmer introduced vulnerabilities. In this video, we'll explore the basics of the stack guard/stack cookie, how to identify them in IDA Pro, and then see them disrupt our buffer overflow in WinDbg. We'll also explore how this mitigation re-organizses the …

basics buffer buffer overflows compiler cookies exploitation foundations helping mitigations programmer series software stack third video vulnerabilities

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Associate Manager, BPT Infrastructure & Ops (Security Engineer)

@ SC Johnson | PHL - Makati

Cybersecurity Analyst - Project Bound

@ NextEra Energy | Jupiter, FL, US, 33478

Lead Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts

Junior Information Security Coordinator (Internship)

@ Garrison Technology | London, Waterloo, England, United Kingdom

Sr. Security Engineer

@ ScienceLogic | Reston, VA